Sciweavers

276 search results - page 3 / 56
» The Effectiveness of Whitelisting: a User-Study
Sort
View
SOUPS
2005
ACM
13 years 11 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...
CEAS
2005
Springer
13 years 11 months ago
SMTP Path Analysis
Most proponents of domain authentication suggest combining domain authentication with reputation services. This paper presents a new learning algorithm for learning the reputation...
Barry Leiba, Joel Ossher, V. T. Rajan, Richard Seg...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
13 years 11 months ago
Combining Speak-Up with DefCOM for Improved DDoS Defense
—This work combines two existing defenses against distributed denial-of-service (DDoS) attacks DefCOM and Speak-up resulting in a synergistic improvement. DefCOM defense organize...
Mohit Mehta, Kanika Thapar, George C. Oikonomou, J...
GRAPHICSINTERFACE
2009
13 years 3 months ago
Parallax photography: creating 3D cinematic effects from stills
We present an approach to convert a small portion of a light field with extracted depth information into a cinematic effect with simulated, smooth camera motion that exhibits a se...
Ke Colin Zheng, Alex Colburn, Aseem Agarwala, Mane...
CHI
2011
ACM
12 years 9 months ago
More than skin deep: measuring effects of the underlying model on access-control system usability
In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. We present the results of a user study that demonstr...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...